Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of trusted computing and secure boot processes in this 31-minute video lecture. Delve into topics such as TPM chips, endorsement keys, storage root keys, and the Coppersmith attack. Learn about Apple's T2 chip, disk encryption techniques, and the importance of entropy in security systems. Gain insights into BitLocker and methods for measuring entropy, enhancing your understanding of eSecurity and trusted host environments.